Secure agent data integrity shield

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure agent data integrity shield

In the rapidly expanding field of E-Commerce, mobile agent is the emerging technology that addresses the requirement of intelligent filtering/processing of information. This paper will address the area of mobile agent data integrity protection. We propose the use of Secure Agent Data Integrity Shield (SADIS) as a scheme that protects the integrity of data collected during agent roaming. With th...

متن کامل

Data Integrity Limitations in Highly Secure Systems

We discuss a class of computer/network architectures that supports multilevel security while utilizing commercial-off-the-shelf (COTS) workstations and COTS productivity software applications. We show that a property of these architectures is that, while supporting multilevel confidentiality policies, they do not generally support partially ordered integrity policies: specifically, these archit...

متن کامل

Integrity Protection of Mobile Agent Data

introduction One hindrance to the widespread adoption of mobile-agent technology is the lack of security. Security will be the issue that has to be addressed carefully if mobile agents are to be used in the field of electronic commerce. SAFER (secure agent fabrication, evolution and roaming) is a mobile-agent framework that is specially designed for the purpose of electronic commerce (Guan buil...

متن کامل

Mobile Agent Data Integrity Using Multi-agent Architecture

Protection of agent data state and partial results in mobile agent systems continues to draw research interest. Current solutions to integrity attacks are geared at detection of malicious activity a posteriori. We propose multi-agent architecture that uses cooperating multi-hop and single-hop agents to prevent such attacks and discuss security features of our scheme. We also examine data protec...

متن کامل

Cluster Enhanced Secure Authentication Scheme for Data Integrity in Manet

Mobile ad hoc networks (MANETs) consist of wireless mobile nodes that can dynamically and freely selforganize into arbitrary and temporary ad hoc network topologies. Due to high mobility of nodes, there exist frequent link breakages which lead to frequent path failures and route discoveries. In a route discovery, both cluster and broadcasting scheme is deployed, where a mobile node blindly rebr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronic Commerce Research and Applications

سال: 2004

ISSN: 1567-4223

DOI: 10.1016/j.elerap.2003.12.001